Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 11:31
Behavioral task
behavioral1
Sample
ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe
Resource
win7-20240903-en
General
-
Target
ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe
-
Size
3.8MB
-
MD5
a4f21876ac5aec30d284a8bfb43f5400
-
SHA1
3d11289529c98e0c14f99d6b06607ab10dead776
-
SHA256
ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962
-
SHA512
27fe2d69e57c1684eb7edc8c0c07092b0e72820d4195556a512752b1fc9864736f1943884f30a9e0dd629a170313aa1830c1d911562e3638eaebf7afec1fc27f
-
SSDEEP
49152:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98x:Q6XLq/qPPslzKx/dJg1ErmNg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x000c000000012280-7.dat family_blackmoon behavioral1/memory/2376-8-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/2148-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2376 nbnhtn.exe -
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x000c000000012280-7.dat upx behavioral1/memory/2376-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2148-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 2376 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhtn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2376 2148 ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe 30 PID 2148 wrote to memory of 2376 2148 ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe 30 PID 2148 wrote to memory of 2376 2148 ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe 30 PID 2148 wrote to memory of 2376 2148 ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe 30 PID 2376 wrote to memory of 2160 2376 nbnhtn.exe 31 PID 2376 wrote to memory of 2160 2376 nbnhtn.exe 31 PID 2376 wrote to memory of 2160 2376 nbnhtn.exe 31 PID 2376 wrote to memory of 2160 2376 nbnhtn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe"C:\Users\Admin\AppData\Local\Temp\ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\nbnhtn.exec:\nbnhtn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 363⤵
- Program crash
PID:2160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD51bdf40f78e14fe87306429ab392ed2ba
SHA1cffc9f3de2bf843661e9c38e7ea073b4c852a40b
SHA2562cf5b5d36e0c7e86f1fb4a46840f561926c39c65411292bf3b6de7912e7ce722
SHA512f9fa2c8dae44e50de087bedd2bc4d9c88f0cbbd032b9fc3d03345a65a42708fb1cfeb468c83561deed6edf6af1e9a6222230faba3afc9947c0c2b6e1b576ce54